Bug 31387 - php-smarty new security issue CVE-2018-25047
Summary: php-smarty new security issue CVE-2018-25047
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 8
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA8-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2023-01-10 14:36 CET by David Walser
Modified: 2023-01-24 09:00 CET (History)
5 users (show)

See Also:
Source RPM: php-smarty-4.1.1-1.mga8.src.rpm
CVE: CVE-2018-25047
Status comment:


Attachments

Description David Walser 2023-01-10 14:36:58 CET
Debian-LTS has issued an advisory on January 5:
https://www.debian.org/lts/security/2023/dla-3262

The issue is fixed upstream in 4.2.1:
https://github.com/smarty-php/smarty/releases/tag/v4.2.1
David Walser 2023-01-10 14:37:06 CET

Status comment: (none) => Fixed upstream in 4.2.1

Marc Krämer 2023-01-11 06:07:28 CET

CVE: (none) => CVE-2018-25047

Comment 1 Marc Krämer 2023-01-11 06:15:08 CET
It was discovered that there was a potential cross-site scripting vulnerability in smarty3, a widely-used PHP templating engine.

In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user.

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25047
https://www.debian.org/lts/security/2023/dla-3262
https://github.com/smarty-php/smarty/releases/tag/v4.2.1

Updates in core/updates_testing:
php-smarty-4.2.1-1.mga8.noarch.rpm

SRPM:
php-smarty-4.2.1-1.mga8.src.rpm

Assignee: mageia => qa-bugs

David Walser 2023-01-11 08:28:12 CET

Status comment: Fixed upstream in 4.2.1 => (none)
CC: (none) => mageia

Comment 2 Herman Viaene 2023-01-18 16:21:19 CET
MGA8-64 MATE on Acer Aspire 5253
No installation issues.
As in previoous updates, OK on clean install.

CC: (none) => herman.viaene
Whiteboard: (none) => MGA8-64-OK

Comment 3 Thomas Andrews 2023-01-18 20:08:09 CET
Validating. Advisory in Comment 1.

Keywords: (none) => validated_update
CC: (none) => andrewsfarm, sysadmin-bugs

Dave Hodgins 2023-01-24 01:42:56 CET

CC: (none) => davidwhodgins
Keywords: (none) => advisory

Comment 4 Mageia Robot 2023-01-24 09:00:25 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2023-0014.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.